Abstract
One of the most interesting paradigms of Ambient Intelligence is that networks of pervasive intelligent interfaces recognize our presence and mould our environment to our immediate needs. In this paper, we present an example of how an access control model such as XACML adapts its functionality at runtime to new and unforeseen requirements. In previous work, we have proposed a three levels hierarchy of artefacts to semantically represent Security and Dependability solutions so that they can be automatically applied and adapted to new context requirements. Here we apply those artefacts throughout two case studies covering (i) the representation of the XACML model and (ii) a Policy Enforcement Point. The use of these artefacts provides the interoperability, run-time reaction to changes in the application context, and the possibility to monitor the applied solutions.
Work partially supported by E.U. through projects SERENITY (IST-027587) and GREDIA (IST-034363) and by Junta de Castilla la Mancha through MISTICO-MECHANICS project (PBC06-0082)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Khan, K. M., Han, J., and Zheng, Y. 2000. Security Characterization of Software Components and Their Composition. In Proceedings of the 36th international Conference on Technology of Object-Oriented Languages and Systems (Tools-Asia’00) (October 30–November 04, 2000). TOOLS. IEEE Computer Society, Washington, DC, 240.
Sewell, P. and Vitek, J. 1999. Secure Composition of Insecure Components. In Proceedings of the 1999 IEEE Computer Security Foundations Workshop (June 28–30, 1999). CSFW. IEEE Computer Society, Washington, DC, 136.
Kurt Bauknecht. 2002. LV-Nummer: 400376. Ambient Intelligence: The Vision of Information Society. BWZ der Universitat Wien.
Francisco Sanchez-Cid, Antonio Muñoz, Daniel Serrano, M.C. Gago. Software Engineering Techniques Applied to AmI: Security Patterns. In Proceedings of the First International Conference on Ambient Intelligence Developments (September, 2006). Developing Ambient Intelligence, Springer. Pages 108–124. ISBN: 2-287-47469-2
Francisco Sanchez-Cid, Antonio Maña. Patterns for Automated Management of Security and Dependability Solutions. 1st International Workshop on Secure systems methodologies using patterns (SPattern’07), Regensburg (Germany), September 03–07, 2007.
Antonio Maña, Francisco Sanchez-Cid, Daniel Serrano, Antonio Muñoz. Building Secure Ambient Intelligence Scenarios. Eighteenth International Conference on Software Engineering and Knowledge Engineering (SEKE’06), San Francisco (USA), 2006.
Becker, S.; Canal, C.; Diakov, N.; Murillo, J.M.; Poizat, P.; Tivoli, M. 2006. Coordination and Adaptation Techniques: Bridging the Gap between Design and Implementation. Report on the ECOOP’2006 Workshop on Coordination and Adaptation Techniques for Software Entities (WCAT’06). ECOOP 2006 Workshop Reader, LNCS, Springer.
Khan, K.; Han, J. Composing Security-aware Software. 2002. IEEE Software, Vol. 19, Issue 1, pp 34–41. IEEE.
Brogi, A.; Camara, J.; Canal, C; Cubo, J.; Pimentel E. 2006. Dynamic Contextual Adaptation CONCUR’2006 Workshop on the Foundations of Coordination Languages and Software Architectures (FOCLASA’06). Electronic Notes in Theoretical Computer Science, Elsevier, ISSN 1571-0661.
Khan, K.; Han, J.; Zheng, Z.; Security properties of software Components. 1999. Proceedings of Information Security: Second International Workshop, ISW’99, Lecture Notes in Computer Science, Volume 1729.
McDermid, J.A; Shi, Q. 1992. Secure composition of systems. Proceedings of Eighth Annual Computer Security Applications Conference. Pp. 112–122.
Nobukazu Y., Shinichi H., Anthony F. Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems, Enterprise Distributed Object Computing Conference, 2004. Eighth IEEE International Volume, Issue, 20–24 Sept. 2004 Page(s): 84–97.
M. Wooldridge, N. R. Jennings, and D. Kinny. The Gaia methodology for agent-oriented analysis and design. Journal of Autonomous Agents and Multi-Agent Systems, 3(3), pp. 285–312, 2000.
Jaeger, T; Liedtke, J; Pantellenko, V; Park, Y; Islam, N. 1998. Security Architecture for component-based Operating System. In ACM Special Interest Group in Operating Systems (SIGOPS) European Workshop, 1998. 118.
Lopez, J; Maña, A; Ortega, J.J; Troya, J.; Yagüe, M.I, 2003. Integrating PMI Services in CORBA Applications. Computer Standards & Interfaces, 25,4, pp. 391–409, Elsevier.
C. Canal, L. Fuentes, E. Pimentel, J.M. Troya, A. Vallecillo. “Adding Roles to CORBA Objects”. IEEE Transactions on Software Engineering 29(3):242–260, Mar. 2003.
XAMCL and OASIS Security Services Technical Committee. “eXtendible Access Control Markup Language (xacml) committee specification 2.0,” Feb 2005.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag France, Paris
About this paper
Cite this paper
Muñoz, A., Sánchez-Cid, F., El Khoury, P., Compagna, L. (2008). XACML as a Security and Dependability Pattern for Access Control in AmI environments. In: Developing Ambient Intelligence. Springer, Paris. https://doi.org/10.1007/978-2-287-78544-3_14
Download citation
DOI: https://doi.org/10.1007/978-2-287-78544-3_14
Publisher Name: Springer, Paris
Print ISBN: 978-2-287-78543-6
Online ISBN: 978-2-287-78544-3
eBook Packages: Computer ScienceComputer Science (R0)